SlideShare une entreprise Scribd logo
1  sur  13
UNCLASSIFIED//LAW
ENFORCEMENT SENSITIVE
(U) BLogo imprinted on coins
FEDERAL BUREAU OF INVESTIGATION
INTELLIGENCE BULLETIN
Cyber Division, Innocent Images
National Initiative
31 January 2007
(U) Symbols and Logos Used by
Pedophiles to Identify Sexual
Preferences
(U//FOUO) This intelligence bulletin
addresses Crimes Against Children
Standing
Intelligence Requirements Set
contained in Q-FBI-2200-005-06, HRWC
CAC-VI.A.5.
(U//LES) Pedophiles, to include those who sexually abuse children as well as those who
produce, distribute, and trade child pornography, are using various types of identification
logos or symbols to recognize one another and distinguish their sexual preferences. To
specifically indicate the pedophile’s gender preference, members of pedophilic organizations
encourage the use of descriptions such as “boylove”, “girllove”, and “childlove.”1 These
symbols have been etched into rings and formed into pendants, and have also been found
imprinted on coins.
(U) The BoyLover logo (BLogo) is a small blue spiral-shaped triangle surrounded by a larger
triangle, whereby the small triangle represents a small boy and the larger triangle
represents
an adult man.2 A variation of the BLogo is the Little Boy Lover logo (LBLogo), which also
embodies a small spiral-shaped triangle within a larger triangle; however, the corners of the
LBLogo are rounded to resemble a scribbling by a young child.3 Images of the BLogo and
LBLogo symbols are depicted to follow …
(U) BLogo aka
“Boy
Lover”
(U) LBLogo aka
“Little
Boy Lover”
(U) BLogo imprinted
on coins
(U) BLogo jewelry
(U) The GirlLover logo (GLogo) depicted below is a
small heart surrounded by a larger
heart, which symbolizes a relationship between an
adult male or female and minor girl.
(U) GLogo
a.k.a. “Girl
Lover,”
Childlove
(U) GLogo Pendant
(U) The ChildLover logo (CLogo), as shown below,
resembles a butterfly and represents
non-preferential gender child abusers. The
Childlove Online Media Activism Logo
(CLOMAL), also represented below, is a general
purpose logo used by individuals who use
online media such as blogs and webcasts.4
(U) CLogo a.k.a.
“Child
Lover”
(U) CLOMAL a.k.a.
Childlove Online Media
Activism
(U) Boylover.net
banner
(U//LES) FBI investigations in several cities
have uncovered several symbols used by
pedophiles to proclaim their attraction to
children. After a seizure of a subject’s
computer inconnection with an Innocent
Images case in the Jacksonville Division, a
Computer AnalysisResponse Team forensic
examiner came across an unfamiliar symbol
that was integrated into
a Web site banner named “ATBOYS.COM,
where the “A” in “ATBOYS” was actually the
BoyLove symbol and written as follows:
TBOYS.com. It was further determined that
“ATBOYS” is an acronym for Attracted To
Boys.5 These pedophilia symbols also appear
on
Web sites such as one of the banners
advertised on www.boylover.net
(U//LES) In another incident, FBI Sacramento
was alerted by the California Department of
Justice about an unusual marking on a coin.
Research of the marking concluded that the
BoyLover logo (BLogo) was imprinted on the
front of the coin, and the phrase “Kids Love
Pedos” was engraved on the back of the coin.7
(Coins depicting the BLogo are pictured on
page one.) The appearance of the BLogo on
coins is another method used by pedophiles to
announce their sexual preferences.
(U) Pedophilia symbols on jewelry,
coins, Web sites and other effects
are indicative ofadvertisement
methods used by child sexual
predators to promote their cause.
Pedophile activists advocate for the
social acceptance of sexual
relationships between adults and
children. These organizations seek to
decriminalize sexual relationships
between adults andchildren and to
legalize child pornography based on
their belief that children have the
ability to consent to sexual acts.
(U//LES) Identical or similar jewelry and symbols as
described in this intelligence bulletin
should raise suspicion of possible pedophilia activity
when found during searches.
Investigators should also be attentive to pedophilia
symbols advertised on Web sites. During
examinations of computer files, investigators should
be conscious of subjects who try to
conceal child pornography by labeling them with
symbols instead of the typical suggestive
explicit names.
(U) This Intelligence Bulletin was prepared by the FBI’s
Cyber Division, Innocent
Images Unit. Please address all comments or
questions to the Innocent Images Unit at
301-586-1613.
UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE
Distribution
Executive Assistant Director, National Security Branch
Associate Executive Assistant Director, National Security
Branch
Assistant Director, Directorate of Intelligence
Assistant Director, Counterintelligence Division
Assistant Director, Counterterrorism Division
Assistant Director, Criminal Investigative Division
Assistant Director, Cyber Division
Deputy Assistant Director, Directorate of Intelligence
Section Chief, Information Sharing and Analysis Section (ISAS),
CyD
SAC/ASACs
All Field Offices
LEO
FBI Intranet
THANK YOU !
MUITO OBRIGADA !
Diramar
www.slideshare.net/Diramar
Depends on us
Depende de nós
(Balão Mágico)

Contenu connexe

Tendances

Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
mohitronnie
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
DecosimoCPAs
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
Elias Mose
 
Chapter 1 the fatf's initiatives on aml
Chapter 1   the fatf's initiatives on amlChapter 1   the fatf's initiatives on aml
Chapter 1 the fatf's initiatives on aml
Quan Risk
 
AML Sanctions Presentation
AML Sanctions PresentationAML Sanctions Presentation
AML Sanctions Presentation
williamsmcguire
 

Tendances (20)

FCPA Overview
FCPA OverviewFCPA Overview
FCPA Overview
 
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El NakibICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
ICBC AML Risk-Based Approach (Jan 2011) by Bachir El Nakib
 
EB-5 presentation
EB-5 presentation EB-5 presentation
EB-5 presentation
 
Money laundering by Imad Feneir
Money laundering by Imad FeneirMoney laundering by Imad Feneir
Money laundering by Imad Feneir
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
Chapter 6 analysis
Chapter 6 analysisChapter 6 analysis
Chapter 6 analysis
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Criminal Justice 5: Types of Reports
Criminal Justice 5: Types of ReportsCriminal Justice 5: Types of Reports
Criminal Justice 5: Types of Reports
 
Crimtic 1
Crimtic 1Crimtic 1
Crimtic 1
 
Structuring and smurfing
Structuring and smurfingStructuring and smurfing
Structuring and smurfing
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Trends in AML Compliance and Technology
Trends in AML Compliance and TechnologyTrends in AML Compliance and Technology
Trends in AML Compliance and Technology
 
Fcpa bullet points
Fcpa bullet pointsFcpa bullet points
Fcpa bullet points
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Anti-money laundering presentation
Anti-money laundering presentationAnti-money laundering presentation
Anti-money laundering presentation
 
Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019Financial crimes compliance and enforcement trends 2019
Financial crimes compliance and enforcement trends 2019
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Chapter 1 the fatf's initiatives on aml
Chapter 1   the fatf's initiatives on amlChapter 1   the fatf's initiatives on aml
Chapter 1 the fatf's initiatives on aml
 
AML Sanctions Presentation
AML Sanctions PresentationAML Sanctions Presentation
AML Sanctions Presentation
 

En vedette (6)

Nasreddin
NasreddinNasreddin
Nasreddin
 
ΕΝΑ ΨΑΡΙ ΠΟΥ ΔΕΝ ΚΟΛΥΜΠΑΕΙ
ΕΝΑ ΨΑΡΙ ΠΟΥ ΔΕΝ ΚΟΛΥΜΠΑΕΙΕΝΑ ΨΑΡΙ ΠΟΥ ΔΕΝ ΚΟΛΥΜΠΑΕΙ
ΕΝΑ ΨΑΡΙ ΠΟΥ ΔΕΝ ΚΟΛΥΜΠΑΕΙ
 
ΣΠΙΤΑΚΙ ΣΤΟ ΛΙΒΑΔΙ
ΣΠΙΤΑΚΙ ΣΤΟ ΛΙΒΑΔΙΣΠΙΤΑΚΙ ΣΤΟ ΛΙΒΑΔΙ
ΣΠΙΤΑΚΙ ΣΤΟ ΛΙΒΑΔΙ
 
Ο ΤΟΜ ΕΙΝΑΙ ΤΙΜΩΡΙΑ
Ο ΤΟΜ ΕΙΝΑΙ ΤΙΜΩΡΙΑΟ ΤΟΜ ΕΙΝΑΙ ΤΙΜΩΡΙΑ
Ο ΤΟΜ ΕΙΝΑΙ ΤΙΜΩΡΙΑ
 
Η ΛΙΛΙΚΑ ΞΕΚΙΝΑΕΙ ΕΡΕΥΝΑ
Η ΛΙΛΙΚΑ ΞΕΚΙΝΑΕΙ ΕΡΕΥΝΑΗ ΛΙΛΙΚΑ ΞΕΚΙΝΑΕΙ ΕΡΕΥΝΑ
Η ΛΙΛΙΚΑ ΞΕΚΙΝΑΕΙ ΕΡΕΥΝΑ
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similaire à Symbols and-logos-used-by-pedophiles-to-identify-sexual-preferences

Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
hinpr18
 
Social Media Impact on Missing Child Organization
Social Media Impact on Missing Child OrganizationSocial Media Impact on Missing Child Organization
Social Media Impact on Missing Child Organization
Lexie Stephens
 
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINALIACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
Kelly Burke
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx
write12
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docx
duketjoy27252
 
Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102
Tigrai Harris
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex trafficking
StopTrafficking
 

Similaire à Symbols and-logos-used-by-pedophiles-to-identify-sexual-preferences (20)

Pedophile Symbols
Pedophile SymbolsPedophile Symbols
Pedophile Symbols
 
Jurist jan thomas stenberg - barnpornografi
Jurist jan thomas stenberg - barnpornografiJurist jan thomas stenberg - barnpornografi
Jurist jan thomas stenberg - barnpornografi
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Crj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutletCrj 101 as we enter the last week of the course/tutorialoutlet
Crj 101 as we enter the last week of the course/tutorialoutlet
 
Presentacion pornography
Presentacion pornographyPresentacion pornography
Presentacion pornography
 
Social Media Impact on Missing Child Organization
Social Media Impact on Missing Child OrganizationSocial Media Impact on Missing Child Organization
Social Media Impact on Missing Child Organization
 
Modern Day Slavery
Modern Day SlaveryModern Day Slavery
Modern Day Slavery
 
Good High School Essay Examples
Good High School Essay ExamplesGood High School Essay Examples
Good High School Essay Examples
 
Pan Cheshire CSE Protocol
Pan Cheshire CSE ProtocolPan Cheshire CSE Protocol
Pan Cheshire CSE Protocol
 
Media coverage of violence against children in Jamaica
Media coverage of violence against children in JamaicaMedia coverage of violence against children in Jamaica
Media coverage of violence against children in Jamaica
 
Existing products research
Existing products researchExisting products research
Existing products research
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINALIACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
IACP COPS Combating Child Sex Trafficking A Guide for LE Leaders- FINAL
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
1990 study of the doj behavorial study child molesters.pdf
1990 study of the doj behavorial study child molesters.pdf1990 study of the doj behavorial study child molesters.pdf
1990 study of the doj behavorial study child molesters.pdf
 
4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx4 forum responses 2 300 words 2 250 words w.docx
4 forum responses 2 300 words 2 250 words w.docx
 
Deviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docxDeviance7ISBN 1-256-36957-8Society The Basics.docx
Deviance7ISBN 1-256-36957-8Society The Basics.docx
 
How To Write A Hook For A Research Paper
How To Write A Hook For A Research PaperHow To Write A Hook For A Research Paper
How To Write A Hook For A Research Paper
 
Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102Sex Trafficking of Children Volume102
Sex Trafficking of Children Volume102
 
9/12 child sex trafficking
9/12 child sex trafficking9/12 child sex trafficking
9/12 child sex trafficking
 

Plus de hamomilaki .

η καθημερινότητα της ελλάδας του 1950 1965
η καθημερινότητα της ελλάδας του 1950 1965η καθημερινότητα της ελλάδας του 1950 1965
η καθημερινότητα της ελλάδας του 1950 1965
hamomilaki .
 
Paidiki epithetikotia
Paidiki epithetikotiaPaidiki epithetikotia
Paidiki epithetikotia
hamomilaki .
 

Plus de hamomilaki . (20)

Covibook in Greek
Covibook in GreekCovibook in Greek
Covibook in Greek
 
Chocolate
ChocolateChocolate
Chocolate
 
Byzantium
ByzantiumByzantium
Byzantium
 
Greece
GreeceGreece
Greece
 
People around us
People around usPeople around us
People around us
 
The most beautiful_beaches_on_earth
The most beautiful_beaches_on_earthThe most beautiful_beaches_on_earth
The most beautiful_beaches_on_earth
 
O kyklos tou nerou
O kyklos tou nerouO kyklos tou nerou
O kyklos tou nerou
 
A nation of sheep will beget a government of wolves
A nation of sheep will beget a government of wolvesA nation of sheep will beget a government of wolves
A nation of sheep will beget a government of wolves
 
The animal kingdom
The animal kingdomThe animal kingdom
The animal kingdom
 
Kakopoihmena paidia
Kakopoihmena paidia Kakopoihmena paidia
Kakopoihmena paidia
 
η καθημερινότητα της ελλάδας του 1950 1965
η καθημερινότητα της ελλάδας του 1950 1965η καθημερινότητα της ελλάδας του 1950 1965
η καθημερινότητα της ελλάδας του 1950 1965
 
Examinations stress
Examinations stressExaminations stress
Examinations stress
 
Ο ρόλος του εκπαιδευτικού στην πρόληψη και καταπολέμηση του αλκοολισμού στην ...
Ο ρόλος του εκπαιδευτικού στην πρόληψη και καταπολέμηση του αλκοολισμού στην ...Ο ρόλος του εκπαιδευτικού στην πρόληψη και καταπολέμηση του αλκοολισμού στην ...
Ο ρόλος του εκπαιδευτικού στην πρόληψη και καταπολέμηση του αλκοολισμού στην ...
 
domestic violence
domestic violencedomestic violence
domestic violence
 
Paidiki epithetikotia
Paidiki epithetikotiaPaidiki epithetikotia
Paidiki epithetikotia
 
Greece 2012 !!!
Greece 2012 !!!Greece 2012 !!!
Greece 2012 !!!
 
Οδηγός για Παιδιά - orange
Οδηγός για Παιδιά - orangeΟδηγός για Παιδιά - orange
Οδηγός για Παιδιά - orange
 
Dr. Hamilton Naki
Dr. Hamilton NakiDr. Hamilton Naki
Dr. Hamilton Naki
 
Isocrates
IsocratesIsocrates
Isocrates
 
The 4 candles
The 4 candlesThe 4 candles
The 4 candles
 

Dernier

一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
Fir La
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
ss
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
CssSpamx
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
e9733fc35af6
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 

Dernier (20)

一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)昆特兰理工大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 

Symbols and-logos-used-by-pedophiles-to-identify-sexual-preferences

  • 1. UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE (U) BLogo imprinted on coins FEDERAL BUREAU OF INVESTIGATION INTELLIGENCE BULLETIN Cyber Division, Innocent Images National Initiative 31 January 2007 (U) Symbols and Logos Used by Pedophiles to Identify Sexual Preferences (U//FOUO) This intelligence bulletin addresses Crimes Against Children Standing Intelligence Requirements Set contained in Q-FBI-2200-005-06, HRWC CAC-VI.A.5.
  • 2. (U//LES) Pedophiles, to include those who sexually abuse children as well as those who produce, distribute, and trade child pornography, are using various types of identification logos or symbols to recognize one another and distinguish their sexual preferences. To specifically indicate the pedophile’s gender preference, members of pedophilic organizations encourage the use of descriptions such as “boylove”, “girllove”, and “childlove.”1 These symbols have been etched into rings and formed into pendants, and have also been found imprinted on coins. (U) The BoyLover logo (BLogo) is a small blue spiral-shaped triangle surrounded by a larger triangle, whereby the small triangle represents a small boy and the larger triangle represents an adult man.2 A variation of the BLogo is the Little Boy Lover logo (LBLogo), which also embodies a small spiral-shaped triangle within a larger triangle; however, the corners of the LBLogo are rounded to resemble a scribbling by a young child.3 Images of the BLogo and LBLogo symbols are depicted to follow …
  • 3. (U) BLogo aka “Boy Lover” (U) LBLogo aka “Little Boy Lover” (U) BLogo imprinted on coins
  • 5. (U) The GirlLover logo (GLogo) depicted below is a small heart surrounded by a larger heart, which symbolizes a relationship between an adult male or female and minor girl. (U) GLogo a.k.a. “Girl Lover,” Childlove (U) GLogo Pendant
  • 6. (U) The ChildLover logo (CLogo), as shown below, resembles a butterfly and represents non-preferential gender child abusers. The Childlove Online Media Activism Logo (CLOMAL), also represented below, is a general purpose logo used by individuals who use online media such as blogs and webcasts.4 (U) CLogo a.k.a. “Child Lover” (U) CLOMAL a.k.a. Childlove Online Media Activism
  • 7. (U) Boylover.net banner (U//LES) FBI investigations in several cities have uncovered several symbols used by pedophiles to proclaim their attraction to children. After a seizure of a subject’s computer inconnection with an Innocent Images case in the Jacksonville Division, a Computer AnalysisResponse Team forensic examiner came across an unfamiliar symbol that was integrated into a Web site banner named “ATBOYS.COM, where the “A” in “ATBOYS” was actually the BoyLove symbol and written as follows: TBOYS.com. It was further determined that “ATBOYS” is an acronym for Attracted To Boys.5 These pedophilia symbols also appear on Web sites such as one of the banners advertised on www.boylover.net
  • 8. (U//LES) In another incident, FBI Sacramento was alerted by the California Department of Justice about an unusual marking on a coin. Research of the marking concluded that the BoyLover logo (BLogo) was imprinted on the front of the coin, and the phrase “Kids Love Pedos” was engraved on the back of the coin.7 (Coins depicting the BLogo are pictured on page one.) The appearance of the BLogo on coins is another method used by pedophiles to announce their sexual preferences.
  • 9. (U) Pedophilia symbols on jewelry, coins, Web sites and other effects are indicative ofadvertisement methods used by child sexual predators to promote their cause. Pedophile activists advocate for the social acceptance of sexual relationships between adults and children. These organizations seek to decriminalize sexual relationships between adults andchildren and to legalize child pornography based on their belief that children have the ability to consent to sexual acts.
  • 10. (U//LES) Identical or similar jewelry and symbols as described in this intelligence bulletin should raise suspicion of possible pedophilia activity when found during searches. Investigators should also be attentive to pedophilia symbols advertised on Web sites. During examinations of computer files, investigators should be conscious of subjects who try to conceal child pornography by labeling them with symbols instead of the typical suggestive explicit names. (U) This Intelligence Bulletin was prepared by the FBI’s Cyber Division, Innocent Images Unit. Please address all comments or questions to the Innocent Images Unit at 301-586-1613.
  • 11. UNCLASSIFIED//LAW ENFORCEMENT SENSITIVE Distribution Executive Assistant Director, National Security Branch Associate Executive Assistant Director, National Security Branch Assistant Director, Directorate of Intelligence Assistant Director, Counterintelligence Division Assistant Director, Counterterrorism Division Assistant Director, Criminal Investigative Division Assistant Director, Cyber Division Deputy Assistant Director, Directorate of Intelligence Section Chief, Information Sharing and Analysis Section (ISAS), CyD SAC/ASACs All Field Offices LEO FBI Intranet
  • 12.
  • 13. THANK YOU ! MUITO OBRIGADA ! Diramar www.slideshare.net/Diramar Depends on us Depende de nós (Balão Mágico)